A recent Linux update patched a vulnerability that enabled fraudsters to use heap spraying methods to execute arbitrary code and escalate permissions.
A security researcher recently discovered how zero-day exploits could be leveraged to steal private information from desktop Linux systems.
Researchers at the University of California, Riverside discovered a TCP flaw that has resided in the Linux implementation since 2012.
Is the new glibc getaddrinfo vulnerability really GHOST 2.0? Signs point to yes, so organizations should patch this vulnerability immediately.
The newly discovered KeRanger ransomware can be used in attacks on Mac OS X thanks to its Linux source code, undermining many perceptions about the OS.
The GNU C Library (glibc) is vulnerable to a stack-based buffer overflow issue. Learn more about the problem and how to avoid, patch and mitigate it.
Kaspersky Lab recently discovered cross-platform backdoors that connect Linux and Windows. Here's what you need to know about this vulnerability.
A hacker may be helping protect unsuspecting users from malware through the Linux.Wifatch router virus, which protects home networks from botnets.
The Core Infrastructure Initiative has released a ranking of open-source tools that should help the industry avoid problems in OpenSSL and similar tools.
A discussion of three types of cloud environments and details on three side-channel attacks on the platform-as-a-service (PaaS) cloud model specifically.